A typical cybersecurity breach has a predictable pattern of incident and response. Here's a step-by-step overview of what would happen in a typical attack—not just to prove the effectiveness of the company’s security capabilities but also to familiarize individuals with potential threats so they might recognize them when they encounter deviations from the norm. This infographic is from the related article, "Hit or myth? Understanding the true costs and impact of cybersecurity programs," on McKinsey.com: http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/hit-or-myth-understanding-the-true-costs-and-impact-of-cybersecurity-programs